| As a main platform for future network convergence, IMS (IP MultimediaSubsystem) is facing a growing number of security threats due to complexity andopenness of the network structure, and its security issues are attracting increasinglyconcerns of all circles. Moreover, SIP (Session Initiation Protocol) is used as the corecontrol protocol of the IMS, and its security is directly related to the security of IMSsession, and even of the whole system.A comprehensive analysis of the SIP protocol security vulnerabilities and theexploitation of these vulnerabilities are researched in this thesis. An analysis on SIPsecurity vulnerability is made from its operation mechanism, the underlying protocols,the transformation of the media stream and the security mechanisms. The exploitationmethods of these vulnerabilities are studied with the detailed description of their designand implementation. A model of SIP protocol vulnerability exploitation is proposedwith intelligent, distributed processing and hierarchical characteristics, which can beapplied into the situation where are exploited. A SIP attacking system is designed andimplemented using the above model, and the main function modules of the system aredetailedly described. The performance of this system is tested, and the result showsthat varieties of vulnerabilities can be exploited with this system, and the systemachieves the goals of design.The research on the exploitation of SIP vulnerabilities is helpful to understand thesecurity risks in SIP, and has great significance for further study of SIP protocolsecurity mechanisms. |